// artifact family

wireless / wifi controller forensics

10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
10
catalog slugs
10
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. cisco wlc syslog forensic analyzerdrop cisco wlc syslog export · parse ap + client + roam event · runs locally
  2. aruba central audit log forensic analyzerdrop aruba central audit export · parse site + device + admin action · runs locally
  3. ruckus smartzone event log forensic analyzerdrop ruckus smartzone event export · parse ap + client + wlan event · runs locally
  4. meraki wireless event log forensic analyzerdrop meraki wireless event export · parse ssid + client + device · runs locally
  5. ubiquiti unifi controller log forensic analyzerdrop unifi controller log export · parse ap + client + firewall rule · runs locally
  6. rogue access point detectordrop wifi scan export · detect unauthorized bssids + ssid spoof · runs locally
  7. wifi deauth flood anomaly detectordrop wlan deauth event export · detect burst deauth storms · runs locally
  8. wireless client roam timeline correlatordrop 2+ wlan client logs · unified roam path graph · runs locally
  9. captive portal auth anomaly detectordrop hotspot portal auth log · detect credential stuffing bursts · runs locally
  10. multi controller wlan inventory correlatordrop 2+ wlan controller exports · correlate ap + bssid overlap · runs locally
ready